Aim and Scope:
As the Internet of Things (IoT) continues to revolutionize global connectivity—spanning smart cities, industrial automation, healthcare, transportation, and maritime systems—security risks in interconnected IoT ecosystems have become a paramount concern. This special session addresses the multifaceted security challenges in IoT, focusing on vulnerabilities in device communication, data integrity, and system resilience, while fostering innovative solutions to safeguard the next-generation digital landscape.
The rapid proliferation of billions of IoT devices—from resource-constrained sensors to complex industrial controllers—introduces unique threats, including:
Device-level Exploits: Malware infections, firmware vulnerabilities, and physical tampering in edge devices (e.g., smart meters, wearable health monitors, autonomous vehicles).
Network-Level Risks: Man-in-the-middle attacks, protocol vulnerabilities (e.g., MQTT, CoAP), and spectrum interference in heterogeneous networks (WiFi, 5G, satellite, LPWAN).
Data and Privacy Risks: Unsecured data pipelines, unauthorized access to sensitive user/industrial data, and compliance challenges with global regulations (GDPR, CCPA, ISO 27001).
Cyber-Physical Threats: Attacks on critical infrastructure (e.g., smart grids, healthcare IoT, autonomous logistics), risking physical safety and operational continuity.
The session seeks original research that explores fundamental theories, enabling technologies, and practical deployments across the IoT security spectrum. Key focus areas include:
IoT Security Architecture and Protocols:
Lightweight encryption and authentication for low-power devices (e.g., ECC-based schemes, post-quantum cryptography).
Secure edge-to-cloud communication frameworks, including federated learning for privacy-preserving data aggregation.
Zero-trust networking models for dynamic IoT device onboarding and access control.
Threat Detection and Mitigation:
Machine learning-driven anomaly detection for IoT network traffic (e.g., GAN-based intrusion detection, behavioral biometrics).
Blockchain and distributed ledger technologies (DLT) for tamper-proof device identity management and data provenance.
Hardware-based security solutions (TPM, secure enclaves) for device authentication and key management.
Cross-Domain IoT Security Applications:
Industrial IoT (IIoT): Secure remote monitoring of industrial control systems (ICS), resilience against ransomware in manufacturing networks.
Smart Cities: Privacy-preserving data sharing in urban sensor networks, secure orchestration of smart grids and transportation systems.
Healthcare IoT: End-to-end encryption for telemedicine data, secure authentication in wearable health devices.
Maritime IoT: Satellite communication security for smart ships, port automation cybersecurity, and anti-spoofing in navigation systems.
Vehicular IoT: V2X communication security, intrusion detection in connected and autonomous vehicles (CAV).
Emerging Technologies and Trends:
Security for AI-driven IoT (e.g., adversarial machine learning on edge devices).
Reconfigurable intelligent surfaces (RIS) and metasurfaces for secure wireless communication.
Quantum-resistant security solutions for future-proofing IoT networks.
We welcome theoretical, experimental, and review papers that address both foundational research (e.g., cryptography, protocol design) and applied innovations (e.g., real-world deployments, case studies). The session aims to bridge academia and industry, fostering solutions that balance security, scalability, and usability in diverse IoT scenarios.
Acknowledgements:
This special session is organized by Dr. Tianning Zhang (Jiangsu University of Science and Technology, China).
Introduction to organizers:
Tianning Zhang received the Ph.D. degree in computer science and technology from Nanjing University, China, in 2022. She is currently a lecturer at the School of Computer, Jiangsu University of Science and Technology. Her research focuses on wireless IoT security, secure edge computing, and optimization for heterogeneous networks, with a particular emphasis on industrial and maritime IoT applications. She served as a reviewer for SCI journals and a keynote speaker for international conferences.
Submission Process:
If you wish to participate in this special session--SCNIE, please submit your manuscript through the ConfSync:https://confsync.cn/csae/submission and select the Section "Secure Communication and Networking in IoT Ecosystems".We will assign your submission to Dr. Tianning Zhang for a preliminary review. After passing the preliminary review, your manuscript will undergo a secondary review by experts. Notifications of acceptance will be issued concurrently with the main conference notifications. For any questions, please contact: info@confsync.cn.